Archived Papers for Journal
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>
Vol.4, No.2
Publisher: Navneet Singh Sikarwar
Publishing Date: 2015-05-20
- Optimization Design of Band Pass Filter in The Infrared RegionAuthors: Saeed N. Turki
- Intelligence Techniques for e-government applicationsAuthors: HANAA. M. SAID; MOHAMED HAMDY; RANIA El GOHARY; ABDEL-BADEEH M. SALEM
- An improved HMF with PDE for Cellular ImagesAuthors: Garima Goyal
- A Survey on Various Broadcast Techniques for MANETAuthors: AKSHEET SADARSANIYA; ROHIT SRIVASTAVA
- DCT Based Grey Scale Still Image Watermarking Using 1-D Walsh Code and Biometric ProtectionAuthors: B.P.Mishra; Dr.H.N.Pratihari; Dr.P.Das
- PERFORMANCE EVALUATION AND EMISSION CHARACTERISTICS OF A WASTE TRANSFORMER OIL AS AN ALTERNATIVE FUEL FOR DIESEL ENGINEAuthors: E SAIDULU; G.S.GURU DATTATREYA
- IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANETAuthors: Ms Priyanka P Kulkarni; Prof G.M.Bhandari
- Assessing ICT Policy Development and Implementation in Developing Countries: a case study from MoroccoAuthors: Driss Kettani
- A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing techniqueAuthors: R.K Singh; Sunil Bhaskarn
- S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicineAuthors: Prof.Chaitali Gadekar
- NEOTERIC INNOVATION IN GI-FI TECHNOLOGYAuthors: Nandhakumar P; Abhishek Pratap Singh
- Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks TechniqueAuthors: Hala B.Abdul Wahab; Sundus I. Mahdi
- FLASHBACK & ARTIFACTS IN IMAGE CLASSIFICATION DESCRIPTORSAuthors: Parul Prashar; Amit Kumar
- Modified Rc4 Dual Key algorithm based on Irreducible PolynomialAuthors: Abdul Monem Saleh Rahma; Zainab Mohammed Hussein
- Avoid Women Harassment through Web BrowserAuthors: Prof.Aniruddha Madhav Phadke
- The Impact of Mobile and Internet Based Social Network Technologies on Student EducationAuthors: Mahabaleshwar. S. Kabbur; Savitri K
- A Novel Biometric Authentication for ATM SecurityAuthors: SWATHY.G .S; RASMI .P .S
- Digital Signature based secure XML emailsAuthors: Srushti Arekar; Prajakta Jagtap; Priyanka Jagtap; Sharanya Shivakumar
- Digital Signature based secure XML emailsAuthors: Srushti Arekar; Prajakta Jagtap; Priyanka Jagtap; Sharanya Shivakumar
- Machine learning In E- TechnologiesAuthors: HANAA. M. SAID; ABDEL-BADEEH M. SALEM
- Review on various Cyber Crime, Hacker, and AuthoritiesAuthors: Ms Divya Sharma
- NOTES ON AVERAGE QUERY RESPONSE TIME IN DBMSAuthors: SARIKA SAINI
- Image Search Re-ranking based on PrototypeAuthors: Deepali.M.Jalkote; Pravin P.Kalyankar
- Exploring Different Aspects of Social Network Analysis Using Web Mining TechniquesAuthors: Hilal Ahmad Khanday; Rana Hashmy
- FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABEAuthors: Bhuvaneswari Thangaraj; S.Umarani; D.Sharmila
- Data Cleaning Using Clustering Based Data Mining TechniqueAuthors: Sujata Joshi; Usha T.
- Hindi-English Translation Memory SystemAuthors: Nandita Srivastava; Priya Singh; Sukanya Chauhan; Shashi Pal Singh; Ajai Kumar; Hemant Darbari
- Cut Detection and Re-routing in wireless sensor networksAuthors: Mrs.Dipali Sonawane; Alka Khade; Seema Biday
- Survey on Different Techniques in SQL to Prepare Dataset for Data MiningAuthors: Shaila Eksambekar; Suhasini Itkar
- A NEW APPROACH TO SECURITY IN AD HOC NETWORKSAuthors: Rashmi Hegde; H.D.Phaneendra
- Text Hiding Based On Hue Content In HSV Color SpaceAuthors: Ahmed S. Abdalluh
- GRAPHICAL BASED PASSWORD USING KEYSTROKE DYNAMIC AUTHENTICATION SYSTEM FOR BANKING APPLICATIONAuthors: Kajal Birdawade; Varsha Ingale; Manisha Lole; Vrushali Mande; Deepti Nirwal
- Data Protection in Mac OS XAuthors: Neha Setia; Tarun Dalal
- Active Queue Management in MANETs ? A Primer on Network Performance optimizationAuthors: Shallu Bedi; Gagangeet Singh Aujla; Sahil Vashist
- A Policy-Based Framework for Managing Information Security and Privacy Risks in BYOD EnvironmentsAuthors: Abubakar Bello Garba; Jocelyn Armarego; David Murray
- A Survey On Detection Of Mining Service Information Discovery Using SASF CrawlerAuthors: Suganiya.R; Asst.Haripriya.K
- NATURAL LANGUAGE PROCESSING USING ARTIFICIAL INTELLIGENCEAuthors: Unnati Dhavare; Umesh Kulkarn
- A Synthesize Virtual Machine Provisioning Mechanism for Cloud Data CenterAuthors: Ganesh Kumar Vishwakarma; Neelam Sain; Anjul K S Rai
- Automated Self-Billing System Using RFID TechnologyAuthors: Prachi Bhatwal; Onish Chamoli
- Automated Self-Billing System Using RFID TechnologyAuthors: Prachi Bhatwal; Onish Chamoli
- A Review On Modern Secure Mosaic Video Generation For Secure Video TransmissionAuthors: Swapnil Patil; Prof.A.A Deshmukh